In proposed scheme, two-level authentication is used where first level is considered to be as pattern recognition and second level is considered to be as biometric authentication which can be in the form of iris recognition, finger prints, voice recognition etc. These patterns and biometric features are given as an input for accessing the data stored in cloud.